Skip to Main Content
Vulnerability Management
book

Vulnerability Management

by Park Foreman
August 2009
Intermediate to advanced content levelIntermediate to advanced
347 pages
9h 16m
English
Auerbach Publications
Content preview from Vulnerability Management
86 Vulnerability ManageMent
4.5.2.2 Black Box Testing Once the presence of a host has been estab-
lished and that presence recorded in the memory of the scanner, a series
of tests or “checks” are performed to find vulnerabilities. e types of
checks are dependent upon the type of host and the configuration of
the scanner. Generally, two types of checks are performed. A network-
based or surface check is performed, which involves the probing and
analysis of what is evident with limited or no access to services on
the machine other than what is offered to any other peer on the same
network as that which exists between the scanner and the target. is
is also known as an unauthenticated check. e other type of check
is an authenticated, internal ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Vulnerability Management, 2nd Edition

Vulnerability Management, 2nd Edition

Park Foreman

Publisher Resources

ISBN: 9781439801512